Multiple cross-site scripting (XSS) vulnerabilities in PHD Help Desk 1.43 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to area.php; the (2) pagina, (3) sentido, (4) q_registros, and (5) orden parameters to area.php; (6) the q_registros parameter to solic_display.php; (7) the PATH_INFO to area_list.php; (8) the q_registros parameter to area_list.php; (9) the PATH_INFO to atributo.php; the (10) pagina, (11) q_registros, and (12) orden parameters to atributo_list.php; (13) an arbitrary parameter name beginning with "sentido" to atributo_list.php; and (14) the PATH_INFO to caso_insert.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://osvdb.org/60088 | vdb entry |
http://osvdb.org/60090 | vdb entry |
http://secunia.com/advisories/37375 | vendor advisory third party advisory exploit |
http://osvdb.org/60086 | vdb entry |
http://www.securityfocus.com/bid/37029 | vdb entry exploit |
http://osvdb.org/60087 | vdb entry |
http://osvdb.org/60089 | vdb entry |
http://osvdb.org/60085 | vdb entry |